Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-2120

Опубликовано: 11 фев. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.1
CVSS3: 8.4

Описание

The %{password(...)} macro in pastemacroexpander.cpp in the KDE Paste Applet before 4.10.5 in kdeplasma-addons does not properly generate passwords, which allows context-dependent attackers to bypass authentication via a brute-force attack.

РелизСтатусПримечание
devel

not-affected

4:5.10.5-0ubuntu1
esm-apps/xenial

not-affected

4:5.5.5-0ubuntu1
esm-infra-legacy/trusty

not-affected

4:4.13.3-0ubuntu0.1
lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life
trusty

not-affected

4:4.13.3-0ubuntu0.1

Показывать по

EPSS

Процентиль: 21%
0.00069
Низкий

2.1 Low

CVSS2

8.4 High

CVSS3

Связанные уязвимости

redhat
больше 12 лет назад

The %{password(...)} macro in pastemacroexpander.cpp in the KDE Paste Applet before 4.10.5 in kdeplasma-addons does not properly generate passwords, which allows context-dependent attackers to bypass authentication via a brute-force attack.

CVSS3: 8.4
nvd
почти 6 лет назад

The %{password(...)} macro in pastemacroexpander.cpp in the KDE Paste Applet before 4.10.5 in kdeplasma-addons does not properly generate passwords, which allows context-dependent attackers to bypass authentication via a brute-force attack.

CVSS3: 8.4
debian
почти 6 лет назад

The %{password(...)} macro in pastemacroexpander.cpp in the KDE Paste ...

CVSS3: 8.4
github
почти 4 года назад

The %{password(...)} macro in pastemacroexpander.cpp in the KDE Paste Applet before 4.10.5 in kdeplasma-addons does not properly generate passwords, which allows context-dependent attackers to bypass authentication via a brute-force attack.

EPSS

Процентиль: 21%
0.00069
Низкий

2.1 Low

CVSS2

8.4 High

CVSS3